File _patchinfo of Package patchinfo.4836
<patchinfo incident="4836">
<issue id="1039361" tracker="bnc">EMU: VUL-0: EMBARGOED: CVE-2017-1000367: sudo: Qualys new root/setuid privilege escalation method 05-2017</issue>
<issue id="1024145" tracker="bnc">Sudoers fqdn not working as expected in SLES12SP2 compared to SLES11SP4</issue>
<issue id="981124" tracker="bnc">sudo krb5_ccname does not work</issue>
<issue id="1039361" tracker="bnc">EMU: VUL-0: EMBARGOED: CVE-2017-1000367: sudo: path traversal race conditions</issue>
<issue id="1015351" tracker="bnc">sudo is not able to resolve sudo for users when using LDAP - fixed upstream</issue>
<issue id="2017-1000367" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>kstreitova</packager>
<description>
This update for sudo fixes the following issues:
CVE-2017-1000367:
- Due to incorrect assumptions in /proc/[pid]/stat parsing,
a local attacker can pretend that his tty is any file on the filesystem,
thus gaining arbitrary file write access on SELinux-enabled systems. [bsc#1039361]
- Fix FQDN for hostname. [bsc#1024145]
- Filter netgroups, they aren't handled by SSSD. [bsc#1015351]
- Fix problems related to "krb5_ccname" option [bsc#981124]
</description>
<summary>Security update for sudo</summary>
</patchinfo>